Keeping Pace With Cyberspacehttp://keepingpacewithcyberspace.com
Cyber policy with regards to international affairsMon, 19 Feb 2018 18:18:31 +0000en-UShourly1https://wordpress.org/?v=4.9.4http://keepingpacewithcyberspace.com/wp-content/uploads/2017/12/atlas-e1514340840129-150x150.jpgKeeping Pace With Cyberspacehttp://keepingpacewithcyberspace.com
3232An informal podcast about cyber policy with regards to international affairs, designed for those without a technical background. This podcast explores how current events affect diplomacy, security, conflict, norms, and other traditional international affairs topics that have taken on new manifestations in the Information Age. This podcast specifically looks to take the most important current events of each week, and hold a discussion that goes beyond just news, exploring the real international affairs impacts that such events are bringing about.Keeping Pace With CyberspacecleanepisodicKeeping Pace With Cyberspacelucasashbaugh@gmail.comlucasashbaugh@gmail.com (Keeping Pace With Cyberspace)An informal podcast about cyber policy.Keeping Pace With Cyberspacehttp://keepingpacewithcyberspace.com/wp-content/uploads/powerpress/logoitunes.pnghttp://keepingpacewithcyberspace.com
08 – Worldwide Threat Assessmenthttp://keepingpacewithcyberspace.com/2018/02/19/08-worldwide-threat-assessment/
http://keepingpacewithcyberspace.com/2018/02/19/08-worldwide-threat-assessment/#respondMon, 19 Feb 2018 18:12:00 +0000http://keepingpacewithcyberspace.com/?p=115The US intelligence community released its Worldwide Threat Assessment, citing concerns over Russian influence campaigns, increasingly aggressive operations, North Korea, artificial intelligence, and more. This year a new item was added which discusses foreign countries acquiring important technology not only through theft, but through legal purchases as well. Overall there is a steady concern over […]

]]>The US intelligence community released its Worldwide Threat Assessment, citing concerns over Russian influence campaigns, increasingly aggressive operations, North Korea, artificial intelligence, and more. This year a new item was added which discusses foreign countries acquiring important technology not only through theft, but through legal purchases as well. Overall there is a steady concern over the “4 Key Adversaries”, something Rex Tillerson’s proposed state department’s restructuring reflects.

]]>http://keepingpacewithcyberspace.com/2018/02/19/08-worldwide-threat-assessment/feed/0The US intelligence community released its Worldwide Threat Assessment, citing concerns over Russian influence campaigns, increasingly aggressive operations, North Korea, artificial intelligence, and more. This year a new item was added which discusses...The US intelligence community released its Worldwide Threat Assessment, citing concerns over Russian influence campaigns, increasingly aggressive operations, North Korea, artificial intelligence, and more. This year a new item was added which discusses foreign countries acquiring important technology not only through theft, but through legal purchases as well. Overall there is a steady concern over […]Keeping Pace With Cyberspaceclean18:3107 – Pyeongchang Olympicshttp://keepingpacewithcyberspace.com/2018/02/10/07-pyeongchang-olympics/
http://keepingpacewithcyberspace.com/2018/02/10/07-pyeongchang-olympics/#respondSat, 10 Feb 2018 23:26:07 +0000http://keepingpacewithcyberspace.com/?p=111The Pyeongchang Olympics is as strenuous a cybersecurity event as it is an athletic one. The giant event is a field day for cybercriminals and possible state sponsored events, and the Olympic security personnel have tried their best to prepare for this. South Korea’s flashy opening ceremony hit some set backs yet there was no confirmation […]

]]>The Pyeongchang Olympics is as strenuous a cybersecurity event as it is an athletic one. The giant event is a field day for cybercriminals and possible state sponsored events, and the Olympic security personnel have tried their best to prepare for this. South Korea’s flashy opening ceremony hit some set backs yet there was no confirmation as to why, and various information systems were targeted on opening night. Fortunately, none of this has had the ability to affect any of the events, best of luck to the athletes!

]]>http://keepingpacewithcyberspace.com/2018/02/10/07-pyeongchang-olympics/feed/0The Pyeongchang Olympics is as strenuous a cybersecurity event as it is an athletic one. The giant event is a field day for cybercriminals and possible state sponsored events, and the Olympic security personnel have tried their best to prepare for this...The Pyeongchang Olympics is as strenuous a cybersecurity event as it is an athletic one. The giant event is a field day for cybercriminals and possible state sponsored events, and the Olympic security personnel have tried their best to prepare for this. South Korea’s flashy opening ceremony hit some set backs yet there was no confirmation […]Keeping Pace With Cyberspaceclean9:0806 – Connecting The Other Halfhttp://keepingpacewithcyberspace.com/2018/02/03/06-connecting-half/
http://keepingpacewithcyberspace.com/2018/02/03/06-connecting-half/#respondSat, 03 Feb 2018 21:41:27 +0000http://keepingpacewithcyberspace.com/?p=108While we often get caught up in the rapid and dramatic developments that unfold in and around cyberspace, we often forget half of the world’s population still isn’t even connected. Earlier this month the UN’s (ITU) Broadband Comission set their aim to connect 75% of the world’s population to the Internet by 2025, along with […]

]]>While we often get caught up in the rapid and dramatic developments that unfold in and around cyberspace, we often forget half of the world’s population still isn’t even connected. Earlier this month the UN’s (ITU) Broadband Comission set their aim to connect 75% of the world’s population to the Internet by 2025, along with many other progressive goals. This week we thumb through each goal and explore some of the general challenges that they face in reaching their commendable 2025 goals and broader 2030 UN Sustainable Development Goals.

]]>http://keepingpacewithcyberspace.com/2018/02/03/06-connecting-half/feed/0While we often get caught up in the rapid and dramatic developments that unfold in and around cyberspace, we often forget half of the world’s population still isn’t even connected. Earlier this month the UN’s (ITU) Broadband Comission set their aim to ...While we often get caught up in the rapid and dramatic developments that unfold in and around cyberspace, we often forget half of the world’s population still isn’t even connected. Earlier this month the UN’s (ITU) Broadband Comission set their aim to connect 75% of the world’s population to the Internet by 2025, along with […]Keeping Pace With Cyberspaceclean19:5305 – Russian Influence Campaignshttp://keepingpacewithcyberspace.com/2018/01/28/05-russian-influence-campaigns/
http://keepingpacewithcyberspace.com/2018/01/28/05-russian-influence-campaigns/#respondSun, 28 Jan 2018 01:03:58 +0000http://keepingpacewithcyberspace.com/?p=106Amidst this years Russian digital influence campaign news real, it’s hard to find a best time to take a moment and discuss the trend as a whole. This week in particular news was leaked of a Dutch counter intelligence operation which witnessed the DNC hack, State Department hack, and even gathered the identities of those behind […]

]]>Amidst this years Russian digital influence campaign news real, it’s hard to find a best time to take a moment and discuss the trend as a whole. This week in particular news was leaked of a Dutch counter intelligence operation which witnessed the DNC hack, State Department hack, and even gathered the identities of those behind the Cozy Bear hacking group. Russia’ three pronged digital influence strategy puts liberal democracies in uncomfortable situations, forced to make tough choices, the results of which are still unfolding.

]]>http://keepingpacewithcyberspace.com/2018/01/28/05-russian-influence-campaigns/feed/0Amidst this years Russian digital influence campaign news real, it’s hard to find a best time to take a moment and discuss the trend as a whole. This week in particular news was leaked of a Dutch counter intelligence operation which witnessed the DNC h...Amidst this years Russian digital influence campaign news real, it’s hard to find a best time to take a moment and discuss the trend as a whole. This week in particular news was leaked of a Dutch counter intelligence operation which witnessed the DNC hack, State Department hack, and even gathered the identities of those behind […]Keeping Pace With Cyberspaceclean18:2004 – Hawaiian Missile Alarmhttp://keepingpacewithcyberspace.com/2018/01/21/04-hawaiian-missile-alarm/
Sun, 21 Jan 2018 00:35:02 +0000http://keepingpacewithcyberspace.com/?p=102A false alarm has left Hawaiians with less trust in alarm systems and critical infrastructure, demonstrating how the trust surround critical infrastructure is often a more (or equally) vulnerable target as the infrastructure itself. Governments continue to work on forging agreements and norms to protect their critical infrastructure, but some wonder how well those can […]

]]>A false alarm has left Hawaiians with less trust in alarm systems and critical infrastructure, demonstrating how the trust surround critical infrastructure is often a more (or equally) vulnerable target as the infrastructure itself. Governments continue to work on forging agreements and norms to protect their critical infrastructure, but some wonder how well those can hold up. The even has invited a larger discussion on trust in cyberspace, and how governments can further protect their critical infrastructure.

]]>A false alarm has left Hawaiians with less trust in alarm systems and critical infrastructure, demonstrating how the trust surround critical infrastructure is often a more (or equally) vulnerable target as the infrastructure itself.A false alarm has left Hawaiians with less trust in alarm systems and critical infrastructure, demonstrating how the trust surround critical infrastructure is often a more (or equally) vulnerable target as the infrastructure itself. Governments continue to work on forging agreements and norms to protect their critical infrastructure, but some wonder how well those can […]Keeping Pace With Cyberspaceclean12:3303 – Meltdown and Spectrehttp://keepingpacewithcyberspace.com/2018/01/14/03-meltdown-spectre/
Sun, 14 Jan 2018 00:05:02 +0000http://keepingpacewithcyberspace.com/?p=85Researchers and companies race to secure processors across a broad range of devices after realizing a severe vulnerability. The Meltdown and Spectre attacks show just how frustrating international supply chain security can be and reveal bigger questions about revealing an attack to the public, keeping it secret, or trying to find another way to safely […]

]]>Researchers and companies race to secure processors across a broad range of devices after realizing a severe vulnerability. The Meltdown and Spectre attacks show just how frustrating international supply chain security can be and reveal bigger questions about revealing an attack to the public, keeping it secret, or trying to find another way to safely mitigate such an issue as to minimize the potential damage. Also, an in-depth exploration of some investigative reporting into a mysterious twitter bot.

]]>Researchers and companies race to secure processors across a broad range of devices after realizing a severe vulnerability. The Meltdown and Spectre attacks show just how frustrating international supply chain security can be and reveal bigger question...Researchers and companies race to secure processors across a broad range of devices after realizing a severe vulnerability. The Meltdown and Spectre attacks show just how frustrating international supply chain security can be and reveal bigger questions about revealing an attack to the public, keeping it secret, or trying to find another way to safely […]Keeping Pace With Cyberspaceclean22:0802 – Iranian Internet Crackdownhttp://keepingpacewithcyberspace.com/2018/01/07/02-iranian-internet-crackdown/
Sun, 07 Jan 2018 01:36:06 +0000http://keepingpacewithcyberspace.com/?p=73As protests rage in Iran, the government has shutdown Telegram, Instagram, and even fully cut off Internet access to certain areas. This shows the dangers when censorship is abused but also speaks of broader lessons for international affairs. Also, this throws a spotlight onto human rights concerns and the modern challenges they face in cyberspace. […]

]]>As protests rage in Iran, the government has shutdown Telegram, Instagram, and even fully cut off Internet access to certain areas. This shows the dangers when censorship is abused but also speaks of broader lessons for international affairs. Also, this throws a spotlight onto human rights concerns and the modern challenges they face in cyberspace.

]]>As protests rage in Iran, the government has shutdown Telegram, Instagram, and even fully cut off Internet access to certain areas. This shows the dangers when censorship is abused but also speaks of broader lessons for international affairs. Also,As protests rage in Iran, the government has shutdown Telegram, Instagram, and even fully cut off Internet access to certain areas. This shows the dangers when censorship is abused but also speaks of broader lessons for international affairs. Also, this throws a spotlight onto human rights concerns and the modern challenges they face in cyberspace. […]Keeping Pace With Cyberspaceclean13:4001 – Pilot – North Korean WannaCry Ransomwarehttp://keepingpacewithcyberspace.com/2017/12/31/01-north-korean-wannacry/
Sun, 31 Dec 2017 02:59:14 +0000http://keepingpacewithcyberspace.com/?p=59North Korea has been officially attributed blame from the U.S., the five eyes, and Japan for the WannaCry ransomware from earlier this year. After over 200,000 computer were affected in 150 different countries, the aftermath of the WannaCry virus spells danger future peaceful norms and raises question about possible new ‘fundraising’ activities, especially in the […]

]]>North Korea has been officially attributed blame from the U.S., the five eyes, and Japan for the WannaCry ransomware from earlier this year. After over 200,000 computer were affected in 150 different countries, the aftermath of the WannaCry virus spells danger future peaceful norms and raises question about possible new ‘fundraising’ activities, especially in the face of booming Bitcoin values.

]]>North Korea has been officially attributed blame from the U.S., the five eyes, and Japan for the WannaCry ransomware from earlier this year. After over 200,000 computer were affected in 150 different countries,North Korea has been officially attributed blame from the U.S., the five eyes, and Japan for the WannaCry ransomware from earlier this year. After over 200,000 computer were affected in 150 different countries, the aftermath of the WannaCry virus spells danger future peaceful norms and raises question about possible new ‘fundraising’ activities, especially in the […]Keeping Pace With Cyberspaceclean18:02